<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security | ConsulThink</title>
	<atom:link href="https://www.consulthink.it/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.consulthink.it</link>
	<description>IT consulting</description>
	<lastBuildDate>Tue, 01 Oct 2024 10:13:04 +0000</lastBuildDate>
	<language>it-IT</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.consulthink.it/wp-content/uploads/2020/02/logo-icon-87x87.ico</url>
	<title>Security | ConsulThink</title>
	<link>https://www.consulthink.it</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Analisi del caso CrowdStrike Falcon</title>
		<link>https://www.consulthink.it/analisi-del-caso-crowdstrike-falcon/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=analisi-del-caso-crowdstrike-falcon</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Wed, 07 Aug 2024 14:56:31 +0000</pubDate>
				<category><![CDATA[Cloud]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[aggiornamenti software]]></category>
		<category><![CDATA[blackout informatico]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[CrowdStrike]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[EDR]]></category>
		<category><![CDATA[Falcon]]></category>
		<category><![CDATA[incidenti di sicurezza]]></category>
		<category><![CDATA[intelligenza artificiale]]></category>
		<category><![CDATA[malfunzionamento]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[sicurezza informatica]]></category>
		<category><![CDATA[tecnologia]]></category>
		<category><![CDATA[vulnerabilità]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10828</guid>

					<description><![CDATA[<p>Cosa è successo? Il 19 luglio 2024, un significativo blackout informatico ha causato importanti disservizi in tutto il mondo. Questo incidente ha colpito migliaia di imprese a livello globale, dalle piccole aziende fino agli enti più grandi, causando l&#8217;arresto di servizi critici e portando a significativi ritardi operativi e perdite finanziarie. A scatenare il blackout ...</p>
<p>The post <a href="https://www.consulthink.it/analisi-del-caso-crowdstrike-falcon/">Analisi del caso CrowdStrike Falcon</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Resilienza IoT: Sicurezza e Privacy dei dispositivi connessi</title>
		<link>https://www.consulthink.it/resilienza-iot-sicurezza-e-privacy-dei-dispositivi-connessi/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=resilienza-iot-sicurezza-e-privacy-dei-dispositivi-connessi</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Mon, 26 Feb 2024 15:37:39 +0000</pubDate>
				<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GRC]]></category>
		<category><![CDATA[Normative]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Resilienza]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10451</guid>

					<description><![CDATA[<p>Introduzione L&#8217;acronimo IoT (Internet Of Things) indica qualsiasi sistema formato da dispositivi connessi a Internet che analizzano e trasferiscono dati. Negli ultimi anni si è assistito a un’accelerazione della loro adozione in una vasta gamma di settori, dalla domotica alla sanità, dalla logistica all&#8217;industria manifatturiera. Basti pensare che i dispositivi IoT rappresentano circa il 54% ...</p>
<p>The post <a href="https://www.consulthink.it/resilienza-iot-sicurezza-e-privacy-dei-dispositivi-connessi/">Resilienza IoT: Sicurezza e Privacy dei dispositivi connessi</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Fenomeno Qishing: la truffa tramite QR Code</title>
		<link>https://www.consulthink.it/fenomeno-qishing-la-truffa-tramite-qr-code/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=fenomeno-qishing-la-truffa-tramite-qr-code</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 20 Oct 2023 09:43:06 +0000</pubDate>
				<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Trend]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Qishing]]></category>
		<category><![CDATA[QR]]></category>
		<category><![CDATA[Truffe]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=10176</guid>

					<description><![CDATA[<p>Nell&#8217;ultimo periodo gli esperti di sicurezza di tutto il mondo attenzionano il diffondersi di una nuova tecnica fraudolenta chiamata Qishing: una pratica sempre più comune che consiste nell&#8217;utilizzare codici QR malevoli per sottrarre alle vittime credenziali, dati sensibili, e addirittura denaro. L’espressione QR Code ovvero “Quick Response Code” significa “codice a risposta veloce” e rappresenta ...</p>
<p>The post <a href="https://www.consulthink.it/fenomeno-qishing-la-truffa-tramite-qr-code/">Fenomeno Qishing: la truffa tramite QR Code</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>iOS Strings Obfuscation in Swift</title>
		<link>https://www.consulthink.it/ios-strings-obfuscation-in-swift/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ios-strings-obfuscation-in-swift</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Wed, 17 May 2023 10:36:12 +0000</pubDate>
				<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Offensive]]></category>
		<category><![CDATA[Red Team]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Obfuscation]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9985</guid>

					<description><![CDATA[<p>Introduction Usually when reversing an iOS Application, it’s common to see methods and strings that can help an attacker to figure out how the application works. When I’m looking for jailbreak detection mechanisms, I usually start to search for strings and functions containing the word “jailbr  (jail, jailbreak or jailbroken) or “root”. If I’m not lucky with these method names, ...</p>
<p>The post <a href="https://www.consulthink.it/ios-strings-obfuscation-in-swift/">iOS Strings Obfuscation in Swift</a> first appeared on <a href="https://www.consulthink.it">ConsulThink</a>.</p>]]></description>
		
		
		
			</item>
		<item>
		<title>Enterprise Architecture a supporto della Information Security</title>
		<link>https://www.consulthink.it/enterprise-architecture-a-supporto-della-information-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=enterprise-architecture-a-supporto-della-information-security</link>
		
		<dc:creator><![CDATA[Consulthink]]></dc:creator>
		<pubDate>Fri, 17 Mar 2023 10:29:26 +0000</pubDate>
				<category><![CDATA[Enterprise Architecture]]></category>
		<category><![CDATA[ExperThinkers]]></category>
		<category><![CDATA[Information Security]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.consulthink.it/?p=9940</guid>

					<description><![CDATA[]]></description>
		
		
		
			</item>
	</channel>
</rss>
